Ja-Chen Lin

According to our database1, Ja-Chen Lin authored at least 56 papers between 1991 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Selection of Embedding Area: A Better Way to Use Prediction-Error Expansion Method for Reversible Hiding.
J. Inf. Sci. Eng., 2020

2019
WEB-VC: Visual Cryptography for Web Image.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

2017
Protection of 3D models using cross recovery.
Multim. Tools Appl., 2017

2015
Progressive sharing of multiple images with sensitivity-controlled decoding.
EURASIP J. Adv. Signal Process., 2015

2012
An accelerated K-means clustering algorithm using selection and erasure rules.
J. Zhejiang Univ. Sci. C, 2012

Image Hiding by LSB Matching of Higher Payload.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2010
Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion.
J. Vis. Commun. Image Represent., 2010

Authentication and recovery of an image by sharing and lattice-embedding.
J. Electronic Imaging, 2010

Multithreshold progressive image sharing with compact shadows.
J. Electronic Imaging, 2010

Reversible JPEG-Based Hiding Method with High Hiding-Ratio.
Int. J. Pattern Recognit. Artif. Intell., 2010

Data Hiding Based on Side Match Vector Quantization and Modulus Function.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
User-friendly sharing of images: progressive approach based on modulus operations.
J. Electronic Imaging, 2009

Secret Image Sharing: a Boolean-Operations-Based Approach Combining Benefits of Polynomial-Based and Fast Approaches.
Int. J. Pattern Recognit. Artif. Intell., 2009

2008
Authentication and cross-recovery for multiple images.
J. Electronic Imaging, 2008

Hiding Images Using Modified Search-Order Coding and Modulus Function.
Int. J. Pattern Recognit. Artif. Intell., 2008

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering.
EURASIP J. Adv. Signal Process., 2008

Visual Cryptography (VC) with non-expanded shadow images: Hilbert-curve approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Data hiding using VQ index file.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

2007
Visual Salience-Guided Mesh Decomposition.
IEEE Trans. Multim., 2007

VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches.
Pattern Recognit., 2007

2006
Visual cryptography with extra ability of hiding confidential data.
J. Electronic Imaging, 2006

2005
Fragile watermarking for authenticating 3-D polygonal meshes.
IEEE Trans. Multim., 2005

Fault-tolerant and progressive transmission of images.
Pattern Recognit., 2005

3-D Shape Retrieval Using Cognitive Psychology-based Principles.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

A cognitive psychology-based approach for 3-D shape retrieval.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

2004
Sharing and hiding secret images with size constraint.
Pattern Recognit., 2004

2003
An image-sharing method with user-friendly shadow images.
IEEE Trans. Circuits Syst. Video Technol., 2003

A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function.
Pattern Recognit., 2003

Authentication of 3-D Polygonal Meshes.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

2002
Wavelet-based optical flow estimation.
IEEE Trans. Circuits Syst. Video Technol., 2002

Secret image sharing.
Comput. Graph., 2002

2001
Image hiding by optimal LSB substitution and genetic algorithm.
Pattern Recognit., 2001

Why recognition in a statistics-based face recognition system should be based on the pure face portion: a probabilistic decision-based proof.
Pattern Recognit., 2001

Person identification using facial motion.
Proceedings of the 2001 International Conference on Image Processing, 2001

2000
Fast VQ encoding by an efficient kick-out condition.
IEEE Trans. Circuits Syst. Video Technol., 2000

A new LDA-based face recognition system which can solve the small sample size problem.
Pattern Recognit., 2000

1999
Color quantization by preserving color distribution features.
Signal Process., 1999

1998
A 1 log N parallel algorithm for detecting convex hulls on image boards.
IEEE Trans. Image Process., 1998

Fast full search in motion estimation by hierarchical use of Minkowski's inequality (HUMI).
Pattern Recognit., 1998

A New Algorithm For Lossless Still Image Compression.
Pattern Recognit., 1998

New approach to image encryption.
J. Electronic Imaging, 1998

1997
Color image compression by moment-preserving and block truncation coding techniques.
IEEE Trans. Commun., 1997

Error diffusion without contouring effect.
J. Electronic Imaging, 1997

Edge detection and edge-preserved compression for error-diffused images.
Comput. Graph., 1997

1996
Real-time and automatic two-class clustering by analytical formulas.
Pattern Recognit., 1996

A simplified fold number detector for shapes with monotonic radii.
Pattern Recognit., 1996

The family of universal axes.
Pattern Recognit., 1996

Multi-Class Clustering by Analytical Two-Class Formulas.
Int. J. Pattern Recognit. Artif. Intell., 1996

RWM-cut for color image quantization.
Comput. Graph., 1996

1995
Color image sharpening by moment-preserving technique.
Signal Process., 1995

Color quantization by RWM-cut.
Proceedings of the Third International Conference on Document Analysis and Recognition, 1995

1994
Detecting number of folds by a simple mathematical property.
Pattern Recognit. Lett., 1994

Feature-Preserving Clustering of 2-D Data for Two-Class Problems Using Analytical Formulas: An Automatic and Fast Approach.
IEEE Trans. Pattern Anal. Mach. Intell., 1994

1993
Universal principal axes: an easy-to-construct tool useful in defining shape orientations for almost every kind of shape.
Pattern Recognit., 1993

1992
Detection of rotationally symmetric shape orientations by fold-invariant shape-specific points.
Pattern Recognit., 1992

1991
Fold principal axis-a new tool for defining the orientations of rotationally symmetric shapes.
Pattern Recognit. Lett., 1991


  Loading...